Sciweavers

230 search results - page 2 / 46
» Cryptanalysis of the Quadratic Generator
Sort
View
CANS
2009
Springer
194views Cryptology» more  CANS 2009»
14 years 11 days ago
Algebraic Attack on the MQQ Public Key Cryptosystem
Abstract. In this paper, we present an efficient attack on the multivariate Quadratic Quasigroups (MQQ) public key cryptosystem. Our cryptanalysis breaks the MQQ cryptosystem by so...
Mohamed Saied Emam Mohamed, Jintai Ding, Johannes ...
CRYPTO
2004
Springer
112views Cryptology» more  CRYPTO 2004»
13 years 11 months ago
Feistel Schemes and Bi-linear Cryptanalysis
Abstract. In this paper we introduce the method of bi-linear cryptanalysis (BLC), designed specifically to attack Feistel ciphers. It allows to construct periodic biased character...
Nicolas Courtois
IMA
2007
Springer
137views Cryptology» more  IMA 2007»
13 years 12 months ago
Algebraic Cryptanalysis of the Data Encryption Standard
In spite of growing importance of AES, the Data Encryption Standard is by no means obsolete. DES has never been broken from the practical point of view. The triple DES is believed ...
Nicolas Courtois, Gregory V. Bard
JOC
2007
81views more  JOC 2007»
13 years 5 months ago
Theoretical Cryptanalysis of the Klimov-Shamir Number Generator TF-1
The internal state of the Klimov–Shamir number generator TF-1 consists of four words of size w bits each, whereas its intended strength is 22w. We exploit an asymmetry in its out...
Boaz Tsaban
IACR
2011
182views more  IACR 2011»
12 years 5 months ago
Cryptanalysis of AZUMI: an EPC Class-1 Generation-2 Standard Compliant RFID Authentication Protocol
Abstract. In this paper, we analyze the security of AZUMI protocol which is compliant with the EPCClass-1 Generation-2 standard and recently has been proposed by Peris et al. This ...
Masoumeh Safkhani, Nasour Bagheri, Majid Naderi